speermint-8----Page:3
1  2  3 

Next Steps
Second version (-01) before IETF 68
Objective for next versions
to identify and enumerate VoIP threats specific to SPEERMINT
to specify security-related requirements specific to SPEERMINT
Examples (input from Reinaldo Penno, too)
Interception and Modification Threats
Impersonating a proxy
Call Rerouting
DNS and ENUM Hijacking attack
Interruption of Service Threats
Distributed Denial of Service attacks to peering devices
Discussion is expected to happen on mailing list as well
PPT Version